SlideShare a Scribd company logo
1 of 11
Passing Sensitive Data Through the Public Domain
Steve Cornish
steve@blazingpath.com | @stevesquirrol | linkedin.com/in/stevecornish
4th May 2016
About me
By day…
• Contracting Digital / Integration
Architect
• Currently @ Vodafone
By night…
• CTO of Squirrol – a Social Network
for Collectors
• Cool tech
• Pre-funding stage
• Site is live: https://squirrol.com
Why protect data?
Public domain => Internet => untrusted network
• Is the integrity of the data important?
• Is the privacy of the data important?
Data Integrity / Authentication
HMAC functions can be used to verify a message…
a) Comes from the expected source
b) Has not been tampered with in flight
With HMAC, both the source and target generate a token (the MAC)
from the message using a shared key which is compared to establish
integrity.
HMAC
…
Message
…
Generate MAC
from message
Generate MAC
from message
MAC 1
Shared Secret
Shared Secret
Source
Target
MAC 2 Compare
MACs
Data Privacy
• Symmetric and Asymmetric cryptography can be used to secure
data in flight
• Symmetric encryption (e.g. AES):
• The same key is used to encrypt the data and to decrypt the cipher
• Asymmetric encryption (”Public Key Cryptography” / PKI):
• Consists of a public/private key pair
• The data is encrypted using the public key, and decrypted using the private
key
Symmetric
…
Message
…
encrypt
decrypt
…
Message
…
110101010
101001101
010101011
Shared Key
Shared Key
Source
Target
Asymmetric
…
Message
…
encrypt
decrypt
…
Message
…
110101010
101001101
010101011
(Target) Public Key
(Target) Private Key
Source
Target
Summary
• Data Integrity and Data Privacy are two concerns of Data Security
• Data Integrity can be assured using HMACs
• Data Privacy can be enforced using cryptography
Data Security is a big subject – we’ve only scratched the surface
Thank you… Questions?
Appendix
Performance
• HMAC-SHA256
• 1m MACs in 4.76s
• AES-128
• 1m encrypts in 2.54s
• 1m decrypts in 2.13s
(Run on a 5 year old Dell Latitude E6410 with Core i5, 4GB RAM, Win 7 32-Bit…)

More Related Content

Viewers also liked

Fraser Lewis: "FMCG Data & Decisions"
Fraser Lewis: "FMCG Data & Decisions"Fraser Lewis: "FMCG Data & Decisions"
Fraser Lewis: "FMCG Data & Decisions"Digital Henley
 
Daria Taylor: "Personality Before Demographic"
Daria Taylor: "Personality Before Demographic"Daria Taylor: "Personality Before Demographic"
Daria Taylor: "Personality Before Demographic"Digital Henley
 
Patrick Langridge: "Machine Learning & SEO: The Future of Personalised Search"
Patrick Langridge: "Machine Learning & SEO: The Future of Personalised Search"Patrick Langridge: "Machine Learning & SEO: The Future of Personalised Search"
Patrick Langridge: "Machine Learning & SEO: The Future of Personalised Search"Digital Henley
 
Denis Kondopoulos: Increasing Sales Using Data & Personalisation
Denis Kondopoulos: Increasing Sales Using Data & PersonalisationDenis Kondopoulos: Increasing Sales Using Data & Personalisation
Denis Kondopoulos: Increasing Sales Using Data & PersonalisationDigital Henley
 
Harry Powell - "Reimagining Data"
Harry Powell - "Reimagining Data"Harry Powell - "Reimagining Data"
Harry Powell - "Reimagining Data"Digital Henley
 
Tim Budden: "Unlocking Insights from Social Data"
Tim Budden: "Unlocking Insights from Social Data"Tim Budden: "Unlocking Insights from Social Data"
Tim Budden: "Unlocking Insights from Social Data"Digital Henley
 

Viewers also liked (8)

Fraser Lewis: "FMCG Data & Decisions"
Fraser Lewis: "FMCG Data & Decisions"Fraser Lewis: "FMCG Data & Decisions"
Fraser Lewis: "FMCG Data & Decisions"
 
social media
social media social media
social media
 
Daria Taylor: "Personality Before Demographic"
Daria Taylor: "Personality Before Demographic"Daria Taylor: "Personality Before Demographic"
Daria Taylor: "Personality Before Demographic"
 
Patrick Langridge: "Machine Learning & SEO: The Future of Personalised Search"
Patrick Langridge: "Machine Learning & SEO: The Future of Personalised Search"Patrick Langridge: "Machine Learning & SEO: The Future of Personalised Search"
Patrick Langridge: "Machine Learning & SEO: The Future of Personalised Search"
 
Denis Kondopoulos: Increasing Sales Using Data & Personalisation
Denis Kondopoulos: Increasing Sales Using Data & PersonalisationDenis Kondopoulos: Increasing Sales Using Data & Personalisation
Denis Kondopoulos: Increasing Sales Using Data & Personalisation
 
social media
social mediasocial media
social media
 
Harry Powell - "Reimagining Data"
Harry Powell - "Reimagining Data"Harry Powell - "Reimagining Data"
Harry Powell - "Reimagining Data"
 
Tim Budden: "Unlocking Insights from Social Data"
Tim Budden: "Unlocking Insights from Social Data"Tim Budden: "Unlocking Insights from Social Data"
Tim Budden: "Unlocking Insights from Social Data"
 

Similar to Steve Cornish - "Passing Sensitive Data Through The Public Domain"

Secure File Sharing In Cloud Using Encryption with Digital Signature
Secure File Sharing In Cloud Using Encryption with Digital  Signature Secure File Sharing In Cloud Using Encryption with Digital  Signature
Secure File Sharing In Cloud Using Encryption with Digital Signature IJMER
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionSachintha Gunasena
 
Securing the Foundation to Secure the Cloud
Securing the Foundation to Secure the CloudSecuring the Foundation to Secure the Cloud
Securing the Foundation to Secure the CloudTrent Adams
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...Kimberly Thomas
 
How encryption works
How encryption worksHow encryption works
How encryption workss1180012
 
researchpaperfinal1
researchpaperfinal1researchpaperfinal1
researchpaperfinal1Sumit Bajaj
 
Best Practice TLS for IBM Domino
Best Practice TLS for IBM DominoBest Practice TLS for IBM Domino
Best Practice TLS for IBM DominoJared Roberts
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
 
M08 protecting your message data in IBM MQ with encryption
M08 protecting your message data in IBM MQ with encryptionM08 protecting your message data in IBM MQ with encryption
M08 protecting your message data in IBM MQ with encryptionRobert Parker
 
Distribution of public keys and hmac
Distribution of public keys and hmacDistribution of public keys and hmac
Distribution of public keys and hmacanuragjagetiya
 
Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Andrew Hammond
 
Seminar on ECommerce
Seminar on ECommerce Seminar on ECommerce
Seminar on ECommerce STS
 
Aws training in bangalore
Aws training in bangalore Aws training in bangalore
Aws training in bangalore apponix123
 

Similar to Steve Cornish - "Passing Sensitive Data Through The Public Domain" (20)

Secure File Sharing In Cloud Using Encryption with Digital Signature
Secure File Sharing In Cloud Using Encryption with Digital  Signature Secure File Sharing In Cloud Using Encryption with Digital  Signature
Secure File Sharing In Cloud Using Encryption with Digital Signature
 
$ii7oi5i-12
$ii7oi5i-12$ii7oi5i-12
$ii7oi5i-12
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
 
final ppt TS.pptx
final ppt TS.pptxfinal ppt TS.pptx
final ppt TS.pptx
 
week 12
week 12week 12
week 12
 
s117
s117s117
s117
 
Securing the Foundation to Secure the Cloud
Securing the Foundation to Secure the CloudSecuring the Foundation to Secure the Cloud
Securing the Foundation to Secure the Cloud
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
researchpaperfinal1
researchpaperfinal1researchpaperfinal1
researchpaperfinal1
 
Best Practice TLS for IBM Domino
Best Practice TLS for IBM DominoBest Practice TLS for IBM Domino
Best Practice TLS for IBM Domino
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
M08 protecting your message data in IBM MQ with encryption
M08 protecting your message data in IBM MQ with encryptionM08 protecting your message data in IBM MQ with encryption
M08 protecting your message data in IBM MQ with encryption
 
Distribution of public keys and hmac
Distribution of public keys and hmacDistribution of public keys and hmac
Distribution of public keys and hmac
 
Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...
 
Quant & Crypto Gold
Quant & Crypto GoldQuant & Crypto Gold
Quant & Crypto Gold
 
Seminar on ECommerce
Seminar on ECommerce Seminar on ECommerce
Seminar on ECommerce
 
Mj3422172221
Mj3422172221Mj3422172221
Mj3422172221
 
Aws training in bangalore
Aws training in bangalore Aws training in bangalore
Aws training in bangalore
 
Sw2
Sw2Sw2
Sw2
 

More from Digital Henley

Paul Smyth MBE - "Mobile in a Developing World"
Paul Smyth MBE - "Mobile in a Developing World"Paul Smyth MBE - "Mobile in a Developing World"
Paul Smyth MBE - "Mobile in a Developing World"Digital Henley
 
Rob Barnes - "Personalisation Beyond Automation"
Rob Barnes - "Personalisation Beyond Automation"Rob Barnes - "Personalisation Beyond Automation"
Rob Barnes - "Personalisation Beyond Automation"Digital Henley
 
Omer Dawelbeit - "Cloud and Social Are All You Need To Go Big"
Omer Dawelbeit - "Cloud and Social Are All You Need To Go Big"Omer Dawelbeit - "Cloud and Social Are All You Need To Go Big"
Omer Dawelbeit - "Cloud and Social Are All You Need To Go Big"Digital Henley
 
Tim Pelling - "Illogical Design"
Tim Pelling - "Illogical Design"Tim Pelling - "Illogical Design"
Tim Pelling - "Illogical Design"Digital Henley
 
Mark Wing - "Tune In Before You Shoot Off"
Mark Wing - "Tune In Before You Shoot Off"Mark Wing - "Tune In Before You Shoot Off"
Mark Wing - "Tune In Before You Shoot Off"Digital Henley
 
Chris Grant - "We're Not Alligators"
Chris Grant - "We're Not Alligators"Chris Grant - "We're Not Alligators"
Chris Grant - "We're Not Alligators"Digital Henley
 
James Elderton "A Trick on the Brain"
James Elderton "A Trick on the Brain"James Elderton "A Trick on the Brain"
James Elderton "A Trick on the Brain"Digital Henley
 
Terence Eden "Is Mobile All It's Cracked Up To Be?"
Terence Eden "Is Mobile All It's Cracked Up To Be?"Terence Eden "Is Mobile All It's Cracked Up To Be?"
Terence Eden "Is Mobile All It's Cracked Up To Be?"Digital Henley
 
Pete Doyle "Social Media: Getting Personal"
Pete Doyle "Social Media: Getting Personal"Pete Doyle "Social Media: Getting Personal"
Pete Doyle "Social Media: Getting Personal"Digital Henley
 
Ben Seymour "Practical Responsive Images"
Ben Seymour "Practical Responsive Images"Ben Seymour "Practical Responsive Images"
Ben Seymour "Practical Responsive Images"Digital Henley
 

More from Digital Henley (10)

Paul Smyth MBE - "Mobile in a Developing World"
Paul Smyth MBE - "Mobile in a Developing World"Paul Smyth MBE - "Mobile in a Developing World"
Paul Smyth MBE - "Mobile in a Developing World"
 
Rob Barnes - "Personalisation Beyond Automation"
Rob Barnes - "Personalisation Beyond Automation"Rob Barnes - "Personalisation Beyond Automation"
Rob Barnes - "Personalisation Beyond Automation"
 
Omer Dawelbeit - "Cloud and Social Are All You Need To Go Big"
Omer Dawelbeit - "Cloud and Social Are All You Need To Go Big"Omer Dawelbeit - "Cloud and Social Are All You Need To Go Big"
Omer Dawelbeit - "Cloud and Social Are All You Need To Go Big"
 
Tim Pelling - "Illogical Design"
Tim Pelling - "Illogical Design"Tim Pelling - "Illogical Design"
Tim Pelling - "Illogical Design"
 
Mark Wing - "Tune In Before You Shoot Off"
Mark Wing - "Tune In Before You Shoot Off"Mark Wing - "Tune In Before You Shoot Off"
Mark Wing - "Tune In Before You Shoot Off"
 
Chris Grant - "We're Not Alligators"
Chris Grant - "We're Not Alligators"Chris Grant - "We're Not Alligators"
Chris Grant - "We're Not Alligators"
 
James Elderton "A Trick on the Brain"
James Elderton "A Trick on the Brain"James Elderton "A Trick on the Brain"
James Elderton "A Trick on the Brain"
 
Terence Eden "Is Mobile All It's Cracked Up To Be?"
Terence Eden "Is Mobile All It's Cracked Up To Be?"Terence Eden "Is Mobile All It's Cracked Up To Be?"
Terence Eden "Is Mobile All It's Cracked Up To Be?"
 
Pete Doyle "Social Media: Getting Personal"
Pete Doyle "Social Media: Getting Personal"Pete Doyle "Social Media: Getting Personal"
Pete Doyle "Social Media: Getting Personal"
 
Ben Seymour "Practical Responsive Images"
Ben Seymour "Practical Responsive Images"Ben Seymour "Practical Responsive Images"
Ben Seymour "Practical Responsive Images"
 

Recently uploaded

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Steve Cornish - "Passing Sensitive Data Through The Public Domain"

Editor's Notes

  1. What do I mean by public domain? The internet - any network you don't have control over 2 key questions if you are passing data through untrusted networks Integrity Is it critical that the data could not have been altered? Is it critical that the recipient can trust the source of the data? Privacy Does the data contain any sensitive information
  2. HMAC = Hash-based Message Authentication Code
  3. Subject message: The quick brown fox jumps over the lazy dog